1 00:00:00,330 --> 00:00:06,660 So this issue we're going to see the security, misconfiguration and these misconfiguration include 2 00:00:06,660 --> 00:00:10,150 poorly configured permissions on girls services like a stripper gates. 3 00:00:10,710 --> 00:00:19,440 So if you have some real right permissions from the FAA, you can just access those files content and 4 00:00:19,440 --> 00:00:21,520 having unnecessary if you just like services. 5 00:00:21,520 --> 00:00:22,670 Space are contemporary. 6 00:00:22,680 --> 00:00:30,390 Just you can keep simple and stupid like that and different countries and change your password. 7 00:00:30,570 --> 00:00:40,340 So many devices covid default credentials, recruiters, daughters and any other devices that we like, 8 00:00:40,370 --> 00:00:46,310 cameras that will connect to the Internet like Iot devices and those devices covid before possible. 9 00:00:46,350 --> 00:00:49,620 So you need to change those default credentials. 10 00:00:49,620 --> 00:00:52,310 Otherwise there is a security misconfiguration. 11 00:00:53,100 --> 00:00:57,270 And if you go down this one, you can see this room is the default password. 12 00:00:57,280 --> 00:01:00,600 So there is a software and we need to find it before the purchase of the. 13 00:01:02,850 --> 00:01:05,400 So this film focuses on the firewall. 14 00:01:05,400 --> 00:01:10,590 So these are specific example of security, misconfiguration you could and should generate before passwords, 15 00:01:10,980 --> 00:01:12,570 but people often don't. 16 00:01:13,830 --> 00:01:19,880 So in October 2016, the data business program was taken offline by one of the most memorable Budos 17 00:01:19,950 --> 00:01:22,040 attacks of the past 10 years. 18 00:01:22,710 --> 00:01:29,980 So there is a direct attack in the Danish servers have been through a lot of packets. 19 00:01:30,540 --> 00:01:38,220 So how did the malware take over the systems like the one we can see, the one it takes over the network? 20 00:01:38,220 --> 00:01:45,810 Because the if any other computers are using different passwords, then the malware or one was spread 21 00:01:45,820 --> 00:01:46,550 over the network. 22 00:01:47,400 --> 00:01:49,990 Nobody would have to disclose the username password page. 23 00:01:49,990 --> 00:01:53,290 Senate and the Russian business exposed Internet services. 24 00:01:53,310 --> 00:01:55,560 So it has already some place and it has. 25 00:01:56,950 --> 00:02:03,610 I tried those words and has successfully logged in, so we need to practice what's your mission and 26 00:02:03,610 --> 00:02:08,610 how do we decide to go ahead and open this up? 27 00:02:09,220 --> 00:02:10,930 So this is the website. 28 00:02:10,930 --> 00:02:12,080 I have already opened this one. 29 00:02:13,600 --> 00:02:20,470 So this website, in order to open this one suspenseful note, I note taking app for people who are 30 00:02:20,470 --> 00:02:23,590 tweeting over the not so we don't know what this is. 31 00:02:23,710 --> 00:02:24,610 And the password. 32 00:02:24,880 --> 00:02:25,660 Try this one. 33 00:02:29,070 --> 00:02:34,500 So it is incorrect and just not good to put out this clearly, let's see the source. 34 00:02:38,200 --> 00:02:41,460 On this, uh, reappraisals. 35 00:02:43,880 --> 00:02:45,670 Well, there are no comments as well. 36 00:02:46,390 --> 00:02:56,060 There's only been two notes in the past, so right now, since our this film is concentrating on the 37 00:02:56,060 --> 00:03:03,100 verbal assaults, uh, let's go ahead and take for Pensa, not the four credentials. 38 00:03:03,920 --> 00:03:05,330 So they is good bring. 39 00:03:10,810 --> 00:03:11,290 Sorry. 40 00:03:13,540 --> 00:03:14,770 Sort of this one. 41 00:03:18,590 --> 00:03:21,550 So she's not taking up OK? 42 00:03:22,850 --> 00:03:31,150 It was written in the language and go that this proposal of downloading and comparing you're not wrong 43 00:03:31,190 --> 00:03:32,690 and using the default credentials. 44 00:03:32,720 --> 00:03:35,150 So these are the differentials for the bands. 45 00:03:35,150 --> 00:03:35,420 You're not. 46 00:03:35,540 --> 00:03:42,470 Let me go ahead and cover this one, because I can remember very easily so like dispenza. 47 00:03:45,090 --> 00:03:47,100 And this puzzle, 48 00:03:50,220 --> 00:03:53,820 so we have already successfully. 49 00:03:54,390 --> 00:03:56,610 And it just you worked are a security risk. 50 00:03:57,390 --> 00:04:01,320 And if you do it out to zoom in, you get the. 51 00:04:02,310 --> 00:04:10,920 So when you tell somebody saw the story about this room that somebody started, also, it's a security 52 00:04:10,920 --> 00:04:16,920 misconfiguration that is using the different parts for the purpose of this one of the security misconfiguration. 53 00:04:16,920 --> 00:04:23,730 And you need to change those default passwords immediately before deploying emeriti or just before the 54 00:04:23,730 --> 00:04:24,650 brain are exposed. 55 00:04:26,190 --> 00:04:27,730 So that's all for this video. 56 00:04:27,780 --> 00:04:31,440 I hope you have understood the security configuration of the different passwords.